A Verifiable Encryption Scheme Supporting Fuzzy Search.
Security, Privacy, and Anonymity in Computation, Communication, and Storage Lecture Notes in Computer Science(2019)
Key words
Searchable encryption,Matrix operations,Verifiable retrieval,RSA accumulator,Privacy security
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined